Buffer overflow in VLC Media Player - CVE-2015-5949
Published: August 25, 2015 / Updated: August 3, 2020
Vulnerability identifier: #VU33279
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-5949
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: VideoLAN
Affected software:
VLC Media Player
VLC Media Player
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
VideoLAN VLC media player 2.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted 3GP file, which triggers the freeing of arbitrary pointers.
How to mitigate CVE-2015-5949
Install update from vendor's website.
Sources
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00040.html
- http://packetstormsecurity.com/files/133266/VLC-2.2.1-Arbitrary-Pointer-Dereference.html
- http://www.debian.org/security/2015/dsa-3342
- http://www.openwall.com/lists/oss-security/2015/08/20/3
- http://www.openwall.com/lists/oss-security/2015/08/20/8
- http://www.securityfocus.com/archive/1/536287/100/0/threaded
- https://git.videolan.org/?p=vlc/vlc-2.2.git;a=commitdiff;h=ce91452460a75d7424b165c4dc8db98114c3cbd9;hp=9e12195d3e4316278af1fa4bcb6a705ff27456fd
- https://security.gentoo.org/glsa/201603-08
- https://www.ocert.org/advisories/ocert-2015-009.html